SlideShare a Scribd company logo
Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.
Cybersecurity in Acquisition
Sep 15, 2016 | Page-1
Kristen J. Baldwin
Acting Deputy Assistant Secretary of Defense
for Systems Engineering (DASD(SE))
Federal Cybersecurity Summit
September 15, 2016
Cybersecurity in Acquisition
Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition
Sep 15, 2016 | Page-2
Cybersecurity in Acquisition
• Acquisition program activities must take responsibility for cybersecurity from
earliest research and technology development through system concept, design,
development, test and evaluation, production, fielding, sustainment, and disposal
• Scope of program cybersecurity includes:
– Program information Data about acquisition, personnel, planning, requirements, design, test data, and support
data for the system. Also includes data that alone might not be unclassified or damaging, but in combination
with other information could allow an adversary to compromise, counter, clone, or defeat warfighting capability
– Organizations and Personnel Government program offices, prime and subcontractors, along with
manufacturing, testing, depot, and training organizations
– Networks Government and Government support activities, unclassified and classified networks, contractor
unclassified and classified networks, and interfaces among Government and contractor networks
– Systems and Supporting Systems The system being acquired, system interfaces, and associated training,
testing, manufacturing, logistics, maintenance, and other support systems
Cybersecurity is a requirement for all DoD programs
Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition
Sep 15, 2016 | Page-3
Ensuring Cyber Resilience in
Defense Systems
• Threat
– Adversary who seeks to exploit vulnerabilities to:
− Acquire program and system information
− Disrupt or degrade system performance
− Obtain or alter US capability
• Vulnerabilities
– Found in programs, organizations, personnel, networks, systems,
and supporting systems
– Inherent weaknesses in hardware and software can be used for
malicious purposes
– Weaknesses in processes can be used to intentionally insert
malicious hardware and software
– Unclassified design information within the supply chain can be
aggregated
– US capability that provides a technological advantage can be lost
or sold
• Consequences
– Loss of technological advantage
– System impact – corruption and disruption
– Mission impact – capability is countered or unable to fight through
Access points are throughout
the acquisition lifecycle…
…and across numerous
supply chain entry points
- Government
- Prime, subcontractors
- Vendors, commercial parts
manufacturers
- 3rd party test/certification activities
Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition
Sep 15, 2016 | Page-4
Spectrum of Supply Chain Risks
Product defect/
inadequacy
introduced either
through mistake or
negligence during
design, production,
and post-production
handling resulting in
the introduction of
deficiencies,
vulnerabilities, and
degraded life-cycle
performance.
Mission failure in the
field due to
environmental
factors unique to
military and
aerospace
environment factors
such as particle
strikes, device aging,
hot-spots, electro-
magnetic pulse, etc.
Counterfeit and other
than genuine and
new devices from the
legally authorized
source including
relabeled, recycled,
cloned, defective,
out-of-spec, etc.
Intentional insertion
of malicious
hard/soft coding, or
defect to enable
physical attacks or
cause mission
failure; includes logic
bombs, Trojan kill
switches, backdoors
for unauthorized
control and access to
logic and data.
Unauthorized
extraction of
sensitive intellectual
property using
reverse engineering,
side channel
scanning, runtime
security analysis,
embedded system
security weakness,
etc.
Stolen data provides
potential adversaries
extraordinary insight
into US defense and
industrial capabilities
and allows them to
save time and
expense in
developing similar
capabilities.
Quality
Escape
Reliability
Failure
Fraudulent
Product
Reverse
Engineering
Malicious
Insertion
Information
Losses
DoD Program Protection focuses on risks posed by malicious actors
Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition
Sep 15, 2016 | Page-5
Program Protection in
DoDI 5000.02 Acquisition Policy
• DoDI 5000.02 requires Program Managers to employ system security
engineering practices and prepare a Program Protection Plan (PPP)
to manage the security risks to the program and system elements
that are vulnerable and can be exposed to targeting
– Critical Program Information
– Mission-critical functions and critical components
– Information about the program and within the system
• PPPs are required at all major milestones
– PPPs inform program acquisition strategies, engineering, and test and evaluation plans
– PMs incorporate appropriate PPP requirements into solicitations
Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition
Sep 15, 2016 | Page-6
What Are We Protecting?
What:	A	capability	element	that	
contributes	to	the	warfighters’	
technical	advantage	(CPI)
Key	Protection	Measure	Types:
• Anti-Tamper
• Exportability	Features
Goal:	Prevent	the	compromise	and	
loss	of	CPI
What:	Mission-critical		functions	and	
components
Key	Protection	Measure	Types:
• Software	Assurance
• Hardware	Assurance/Trusted	
Microelectronics
• Supply	Chain	Risk	Management
• Anti-counterfeits
Goal:	Protect	key	mission	
components	from	malicious	activity
What:	Information	about	the	program,	
system,	designs,	processes,	capabilities	
and	end-items
Key	Protection	Measure	Types:
• Classification
• Export	Controls
• Information	Security
Goal:	Ensure	key	system	and	program	
data	is	protected	from	adversary	
collection
Program	Protection	&	Cybersecurity
http://www.acq.osd.mil/se/initiatives/init_pp-sse.html
InformationComponentsTechnology
Protecting Warfighting Capability Throughout the Lifecycle
DoDM 5200.01, Vol. 1-4
DoDI 5200.39 DoDI 5200.44 DoDI 5230.24
DoDM 5200.45DoDI 5000.02
DoDI 8510.01
DoDI 8500.01
Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition
Sep 15, 2016 | Page-7
Program Protection Relationship to
Other Formal Acquisition Activities
- Incorporation into technical baselines
- SSE entry and exit criteria in SE tech reviews
- SSE as a design consideration
- Technical risks and mitigation plans
- Data needed to ascertain cybersecurity requirements
are met
- Cooperative Vulnerability Identification and Penetration
Assessments
- Adversarial Assessments
- Trusted supplier requirements
- Acquisition regulations (Safeguarding Covered Defense
Information, Counterfeits, etc.)
Systems
Engineering
Plan
T&E
Master
Plan
Acq
Strategy
PPP
Tailored to specific program situations
Anti-Tamper
Plan
Cyber-
security
Strategy/
RMF Security
Plan
Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition
Sep 15, 2016 | Page-8
Contract Regulation for Safeguarding
Covered Defense Information
DFARS Clause 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident
Reporting
• 2nd interim rule published December 30, 2015, to provide contractors with additional time to implement
NIST 800-171 security requirements
Purpose
• Establish minimum requirements for contractors and subcontractors to safeguard DoD unclassified covered
defense information and report cyber incidents on their contractor owned and operated information systems
Requires Contractors to
• Flow down only to Subcontractors where their efforts will involve covered defense information or where they will
provide operationally critical support
• Fully comply with security requirements in the NIST SP 800-171, “Protecting Controlled Unclassified Information
in Nonfederal Information Systems and Organizations” NLT Dec 31, 2017
• Report cyber incident and compromises affecting covered defense information
• Submit malware that they are able to discover and isolate in connection with a reported cyber incident
• Support DoD damage assessment as needed
Final rule anticipated to be published in Fall 2016
Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition
Sep 15, 2016 | Page-9
Joint Federated
Assurance Center (JFAC)
• Federation of DoD software and hardware assurance (SwA/HwA) capabilities
– Support programs in addressing current and emerging threats and vulnerabilities
– Facilitate collaboration across the Department and throughout the lifecycle of acquisition programs
– Maximize use of available resources
– Assess and recommend capability and capacity gaps to resource
• Seek innovation in SW and HW inspection, detection, analysis, risk assessment,
and remediation tools and techniques to mitigate risk of malicious insertion
– R&D is key component of JFAC operations
– Focus on improving tools, techniques, and procedures for SwA and HwA to support programs
• Federated Organizations
– Army, Navy, AF, NSA, DMEA DISA, NRO, MDA laboratories and engineering support
organizations; and Department of Energy
JFAC mission is to support programs with SwA and HwA needs
Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition
Sep 15, 2016 | Page-10
Summary
• Cybersecurity is an essential element of acquisition, engineering, test,
and sustainment activities
– We will embed cybersecurity risk mitigation activities into the acquisition program
lifecycle
• We must bring to bear policy, tools, and expertise to enable cyber
resiliency in our systems
– Translate IT and network resiliency to weapon system resiliency
– Establish security as a fundamental discipline of systems engineering
• Opportunities for all of government, industry and academia to engage:
– Continue R&D efforts to determine technological approaches to reduce risk
– Develop engineering and design methods, standards, and tools to enable policy
implementation
– Develop use case scenarios to help educate and train our community

More Related Content

What's hot

Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016
Sarah Bark
 
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخدادReview on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
ReZa AdineH
 
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-OverviewCylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
Innovation Network Technologies: InNet
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
Tripwire
 
Healthcare info tech systems cyber threats ABI conference 2016
Healthcare info tech systems cyber threats ABI conference 2016Healthcare info tech systems cyber threats ABI conference 2016
Healthcare info tech systems cyber threats ABI conference 2016
Amgad Magdy
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
Cylance
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment DatasheetCylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
Innovation Network Technologies: InNet
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security Operations
Priyanka Aash
 
Security Program Development for the Hipster Company
Security Program Development for the Hipster CompanySecurity Program Development for the Hipster Company
Security Program Development for the Hipster Company
Priyanka Aash
 
Threat Life Cycle Management
Threat Life Cycle ManagementThreat Life Cycle Management
Threat Life Cycle Management
Fujitsu Middle East
 
Addressing cyber security
Addressing cyber securityAddressing cyber security
Addressing cyber security
Femi Ashaye
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
Rahul Neel Mani
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
Rahul Neel Mani
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
Komand
 

What's hot (19)

Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016
 
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخدادReview on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
Review on Event Correlation- مروری بر روش های همبسته سازی در مدیریت رخداد
 
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-OverviewCylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
 
Survival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient OrganizationSurvival of the Fittest: How to Build a Cyber Resilient Organization
Survival of the Fittest: How to Build a Cyber Resilient Organization
 
Healthcare info tech systems cyber threats ABI conference 2016
Healthcare info tech systems cyber threats ABI conference 2016Healthcare info tech systems cyber threats ABI conference 2016
Healthcare info tech systems cyber threats ABI conference 2016
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment DatasheetCylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security Operations
 
Security Program Development for the Hipster Company
Security Program Development for the Hipster CompanySecurity Program Development for the Hipster Company
Security Program Development for the Hipster Company
 
Threat Life Cycle Management
Threat Life Cycle ManagementThreat Life Cycle Management
Threat Life Cycle Management
 
SECURITY
SECURITYSECURITY
SECURITY
 
Addressing cyber security
Addressing cyber securityAddressing cyber security
Addressing cyber security
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
 

Viewers also liked

Cyber Security SP 2017
Cyber Security SP 2017Cyber Security SP 2017
Cyber Security SP 2017
Rodrigo Jorge
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
Cyber Security Infotech
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (6)

Cyber Security SP 2017
Cyber Security SP 2017Cyber Security SP 2017
Cyber Security SP 2017
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cybersecurity in Acquisition - Kristen J. Baldwin

A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
Priyanka Aash
 
NACFAM-CFAM-20170907-v5.pptx
NACFAM-CFAM-20170907-v5.pptxNACFAM-CFAM-20170907-v5.pptx
NACFAM-CFAM-20170907-v5.pptx
A2KAROGANHD
 
Isf 2015 continuous diagnostics monitoring may 2015
Isf 2015 continuous diagnostics monitoring  may 2015Isf 2015 continuous diagnostics monitoring  may 2015
Isf 2015 continuous diagnostics monitoring may 2015
abhi75
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
WSO2
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
Sounil Yu
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
SAP Ariba
 
MANAGING RISKS IN IT PROJECTS ... get the complete set and others at www.gafm...
MANAGING RISKS IN IT PROJECTS ... get the complete set and others at www.gafm...MANAGING RISKS IN IT PROJECTS ... get the complete set and others at www.gafm...
MANAGING RISKS IN IT PROJECTS ... get the complete set and others at www.gafm...
GAFM Academy of Project Management ® - ISO 29990 Certified International Board of Standards
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxContainer Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Mandy Sidana
 
Walls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityWalls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application Security
Abdul Jaleel
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
iMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
iMIS
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRhys A. Mossom
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
Digital Bond
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
Anchises Moraes
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
Sujata Raskar
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
NowSecure
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
Tuan Phan
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
EnergyTech2015
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
oswald1horne84988
 

Similar to Cybersecurity in Acquisition - Kristen J. Baldwin (20)

A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
 
NACFAM-CFAM-20170907-v5.pptx
NACFAM-CFAM-20170907-v5.pptxNACFAM-CFAM-20170907-v5.pptx
NACFAM-CFAM-20170907-v5.pptx
 
Isf 2015 continuous diagnostics monitoring may 2015
Isf 2015 continuous diagnostics monitoring  may 2015Isf 2015 continuous diagnostics monitoring  may 2015
Isf 2015 continuous diagnostics monitoring may 2015
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
MANAGING RISKS IN IT PROJECTS ... get the complete set and others at www.gafm...
MANAGING RISKS IN IT PROJECTS ... get the complete set and others at www.gafm...MANAGING RISKS IN IT PROJECTS ... get the complete set and others at www.gafm...
MANAGING RISKS IN IT PROJECTS ... get the complete set and others at www.gafm...
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxContainer Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptx
 
Walls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityWalls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application Security
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolio
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
 

More from scoopnewsgroup

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
scoopnewsgroup
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
scoopnewsgroup
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
scoopnewsgroup
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
scoopnewsgroup
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
scoopnewsgroup
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
scoopnewsgroup
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
scoopnewsgroup
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
scoopnewsgroup
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
scoopnewsgroup
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
scoopnewsgroup
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
scoopnewsgroup
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
scoopnewsgroup
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
scoopnewsgroup
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
scoopnewsgroup
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
scoopnewsgroup
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
scoopnewsgroup
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
scoopnewsgroup
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
scoopnewsgroup
 

More from scoopnewsgroup (20)

2020: What's on Deck for the PMA
2020: What's on Deck for the PMA2020: What's on Deck for the PMA
2020: What's on Deck for the PMA
 
Modernization Requires Choice
Modernization Requires ChoiceModernization Requires Choice
Modernization Requires Choice
 
Smarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security ModernizationSmarter Access is the Bridge to Security Modernization
Smarter Access is the Bridge to Security Modernization
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Building a Zero Trust Architecture
Building a Zero Trust ArchitectureBuilding a Zero Trust Architecture
Building a Zero Trust Architecture
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
IC Fireside Chat
IC Fireside ChatIC Fireside Chat
IC Fireside Chat
 
The Edge to AI
The Edge to AIThe Edge to AI
The Edge to AI
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Keeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & HappyKeeping the Workforce of the Future Empowered, Engaged & Happy
Keeping the Workforce of the Future Empowered, Engaged & Happy
 
Opening Remarks
Opening RemarksOpening Remarks
Opening Remarks
 
It All Starts with Linux
It All Starts with LinuxIt All Starts with Linux
It All Starts with Linux
 
Leadership in the Digital Age
Leadership in the Digital AgeLeadership in the Digital Age
Leadership in the Digital Age
 
Digital Transformation for Government
Digital Transformation for GovernmentDigital Transformation for Government
Digital Transformation for Government
 
DevSecOps: The DoD Software Factory
DevSecOps: The DoD Software FactoryDevSecOps: The DoD Software Factory
DevSecOps: The DoD Software Factory
 
Enhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber RangeEnhancing your Cyber Skills through a Cyber Range
Enhancing your Cyber Skills through a Cyber Range
 
Lessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for CybersecurityLessons Learned from Fire Escapes for Cybersecurity
Lessons Learned from Fire Escapes for Cybersecurity
 
2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit2019 FedScoop Public Sector innovation Summit
2019 FedScoop Public Sector innovation Summit
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Cybersecurity in Acquisition - Kristen J. Baldwin

  • 1. Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited. Cybersecurity in Acquisition Sep 15, 2016 | Page-1 Kristen J. Baldwin Acting Deputy Assistant Secretary of Defense for Systems Engineering (DASD(SE)) Federal Cybersecurity Summit September 15, 2016 Cybersecurity in Acquisition
  • 2. Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition Sep 15, 2016 | Page-2 Cybersecurity in Acquisition • Acquisition program activities must take responsibility for cybersecurity from earliest research and technology development through system concept, design, development, test and evaluation, production, fielding, sustainment, and disposal • Scope of program cybersecurity includes: – Program information Data about acquisition, personnel, planning, requirements, design, test data, and support data for the system. Also includes data that alone might not be unclassified or damaging, but in combination with other information could allow an adversary to compromise, counter, clone, or defeat warfighting capability – Organizations and Personnel Government program offices, prime and subcontractors, along with manufacturing, testing, depot, and training organizations – Networks Government and Government support activities, unclassified and classified networks, contractor unclassified and classified networks, and interfaces among Government and contractor networks – Systems and Supporting Systems The system being acquired, system interfaces, and associated training, testing, manufacturing, logistics, maintenance, and other support systems Cybersecurity is a requirement for all DoD programs
  • 3. Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition Sep 15, 2016 | Page-3 Ensuring Cyber Resilience in Defense Systems • Threat – Adversary who seeks to exploit vulnerabilities to: − Acquire program and system information − Disrupt or degrade system performance − Obtain or alter US capability • Vulnerabilities – Found in programs, organizations, personnel, networks, systems, and supporting systems – Inherent weaknesses in hardware and software can be used for malicious purposes – Weaknesses in processes can be used to intentionally insert malicious hardware and software – Unclassified design information within the supply chain can be aggregated – US capability that provides a technological advantage can be lost or sold • Consequences – Loss of technological advantage – System impact – corruption and disruption – Mission impact – capability is countered or unable to fight through Access points are throughout the acquisition lifecycle… …and across numerous supply chain entry points - Government - Prime, subcontractors - Vendors, commercial parts manufacturers - 3rd party test/certification activities
  • 4. Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition Sep 15, 2016 | Page-4 Spectrum of Supply Chain Risks Product defect/ inadequacy introduced either through mistake or negligence during design, production, and post-production handling resulting in the introduction of deficiencies, vulnerabilities, and degraded life-cycle performance. Mission failure in the field due to environmental factors unique to military and aerospace environment factors such as particle strikes, device aging, hot-spots, electro- magnetic pulse, etc. Counterfeit and other than genuine and new devices from the legally authorized source including relabeled, recycled, cloned, defective, out-of-spec, etc. Intentional insertion of malicious hard/soft coding, or defect to enable physical attacks or cause mission failure; includes logic bombs, Trojan kill switches, backdoors for unauthorized control and access to logic and data. Unauthorized extraction of sensitive intellectual property using reverse engineering, side channel scanning, runtime security analysis, embedded system security weakness, etc. Stolen data provides potential adversaries extraordinary insight into US defense and industrial capabilities and allows them to save time and expense in developing similar capabilities. Quality Escape Reliability Failure Fraudulent Product Reverse Engineering Malicious Insertion Information Losses DoD Program Protection focuses on risks posed by malicious actors
  • 5. Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition Sep 15, 2016 | Page-5 Program Protection in DoDI 5000.02 Acquisition Policy • DoDI 5000.02 requires Program Managers to employ system security engineering practices and prepare a Program Protection Plan (PPP) to manage the security risks to the program and system elements that are vulnerable and can be exposed to targeting – Critical Program Information – Mission-critical functions and critical components – Information about the program and within the system • PPPs are required at all major milestones – PPPs inform program acquisition strategies, engineering, and test and evaluation plans – PMs incorporate appropriate PPP requirements into solicitations
  • 6. Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition Sep 15, 2016 | Page-6 What Are We Protecting? What: A capability element that contributes to the warfighters’ technical advantage (CPI) Key Protection Measure Types: • Anti-Tamper • Exportability Features Goal: Prevent the compromise and loss of CPI What: Mission-critical functions and components Key Protection Measure Types: • Software Assurance • Hardware Assurance/Trusted Microelectronics • Supply Chain Risk Management • Anti-counterfeits Goal: Protect key mission components from malicious activity What: Information about the program, system, designs, processes, capabilities and end-items Key Protection Measure Types: • Classification • Export Controls • Information Security Goal: Ensure key system and program data is protected from adversary collection Program Protection & Cybersecurity http://www.acq.osd.mil/se/initiatives/init_pp-sse.html InformationComponentsTechnology Protecting Warfighting Capability Throughout the Lifecycle DoDM 5200.01, Vol. 1-4 DoDI 5200.39 DoDI 5200.44 DoDI 5230.24 DoDM 5200.45DoDI 5000.02 DoDI 8510.01 DoDI 8500.01
  • 7. Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition Sep 15, 2016 | Page-7 Program Protection Relationship to Other Formal Acquisition Activities - Incorporation into technical baselines - SSE entry and exit criteria in SE tech reviews - SSE as a design consideration - Technical risks and mitigation plans - Data needed to ascertain cybersecurity requirements are met - Cooperative Vulnerability Identification and Penetration Assessments - Adversarial Assessments - Trusted supplier requirements - Acquisition regulations (Safeguarding Covered Defense Information, Counterfeits, etc.) Systems Engineering Plan T&E Master Plan Acq Strategy PPP Tailored to specific program situations Anti-Tamper Plan Cyber- security Strategy/ RMF Security Plan
  • 8. Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition Sep 15, 2016 | Page-8 Contract Regulation for Safeguarding Covered Defense Information DFARS Clause 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting • 2nd interim rule published December 30, 2015, to provide contractors with additional time to implement NIST 800-171 security requirements Purpose • Establish minimum requirements for contractors and subcontractors to safeguard DoD unclassified covered defense information and report cyber incidents on their contractor owned and operated information systems Requires Contractors to • Flow down only to Subcontractors where their efforts will involve covered defense information or where they will provide operationally critical support • Fully comply with security requirements in the NIST SP 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations” NLT Dec 31, 2017 • Report cyber incident and compromises affecting covered defense information • Submit malware that they are able to discover and isolate in connection with a reported cyber incident • Support DoD damage assessment as needed Final rule anticipated to be published in Fall 2016
  • 9. Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition Sep 15, 2016 | Page-9 Joint Federated Assurance Center (JFAC) • Federation of DoD software and hardware assurance (SwA/HwA) capabilities – Support programs in addressing current and emerging threats and vulnerabilities – Facilitate collaboration across the Department and throughout the lifecycle of acquisition programs – Maximize use of available resources – Assess and recommend capability and capacity gaps to resource • Seek innovation in SW and HW inspection, detection, analysis, risk assessment, and remediation tools and techniques to mitigate risk of malicious insertion – R&D is key component of JFAC operations – Focus on improving tools, techniques, and procedures for SwA and HwA to support programs • Federated Organizations – Army, Navy, AF, NSA, DMEA DISA, NRO, MDA laboratories and engineering support organizations; and Department of Energy JFAC mission is to support programs with SwA and HwA needs
  • 10. Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited.Cybersecurity in Acquisition Sep 15, 2016 | Page-10 Summary • Cybersecurity is an essential element of acquisition, engineering, test, and sustainment activities – We will embed cybersecurity risk mitigation activities into the acquisition program lifecycle • We must bring to bear policy, tools, and expertise to enable cyber resiliency in our systems – Translate IT and network resiliency to weapon system resiliency – Establish security as a fundamental discipline of systems engineering • Opportunities for all of government, industry and academia to engage: – Continue R&D efforts to determine technological approaches to reduce risk – Develop engineering and design methods, standards, and tools to enable policy implementation – Develop use case scenarios to help educate and train our community